📜 ⬆️ ⬇️

MS Word vulnerability is exploited in-the-wild

Microsoft reports ( SA 2953095 ) that a new memory-corruption cross-Word (2003-2007-2010-2013) 0day vulnerability CVE-2014-1761 is used by hackers for remote code execution (Remote Code Execution) in directed attacks. Attackers use a specially prepared RTF file to execute code through a vulnerable version of MS Word, or when viewing a message with such a document in Microsoft Outlook. In the attacks exploits for MS Word 2010 were noticed, although the vulnerability is present in all supported MS versions.



The company recommends using the released Fix it tool, which is available at this link . In addition, users of EMET, with customized protection on MS Word, are protected from exploit actions to this vulnerability. EMET v4.1 settings (latest release-version) by default already include the Word process in the list of protected. This can be checked through the setting of Apps. You can also use EMET v5 Technical Preview for protection.
')

Fig. List of protected EMET processes (setting up Apps).


Fig. Marked as a protected Word process in the EMET process list.


Fig. List of vulnerable software.

Source: https://habr.com/ru/post/216949/


All Articles